Results 261 to 270 of about 94,016 (314)
ABSTRACT Background Previous studies reported an association between lung cancer (LC) and partial urological cancers (UCs). However, the exact causal association between LC and UCs remains obscure. Methods A two‐sample bidirectional Mendelian randomization (MR) and the Genetic Risk Scores (GRS) method were used to assess the genetic relationships ...
Hao Zhou +12 more
wiley +1 more source
General retrieval network model for multi-class plant leaf diseases based on hashing. [PDF]
Yang Z, Wu J, Yuan X, Chen Y, Guo Y.
europepmc +1 more source
A systematic approach for identifying drivers of critical safety and establishing their hierarchy
Abstract Learning from incidents is a crucial step in preventing and mitigating adverse events. Incident databases offer valuable insights for safety management improvements by cause and contributing factors. However, extracting meaningful information from incident investigation reports poses a significant challenge. This study introduces a data‐driven
Mohammad Zaid Kamil +2 more
wiley +1 more source
Entropy Extraction from Wearable Sensors for Secure Cryptographic Key Generation in Blockchain and IoT Systems. [PDF]
Švarcmajer M +3 more
europepmc +1 more source
Abstract Climate change and novel fire regimes increasingly challenge stewardship of forests adapted to infrequent, stand‐replacing fire. Novel fire regimes may disrupt mechanisms that sustained postfire regeneration historically, and whether fire management can promote forest resilience to future fires is uncertain. We used the individual‐based forest
Timon T. Keller +7 more
wiley +1 more source
DRPChain: A new blockchain-based trusted DRM scheme for image content protection. [PDF]
Yun J, Liu X, Lu Y, Guan J, Liu X.
europepmc +1 more source
This work presents a secure telemedicine cryptosystem based on a novel 4D memristive chaotic oscillator and a Dispatched Gray Code Scrambler (DGCS). Implemented on FPGA, the system ensures power‐efficient encryption, making it suitable for real‐time medical image transmission in IoT healthcare environments.
Fritz Nguemo Kemdoum +3 more
wiley +1 more source
Machine learning‐enhanced NIDS, integrating diverse data sources and rigorous feature selection, achieves near‐perfect detection of sophisticated evasive cyber threats—including APTs, DDoS, zero‐day exploits, and MitM attacks—surpassing industry benchmarks in accuracy, precision, recall, and F1$$ {\mathrm{F}}_1 $$‐score. ABSTRACT Advanced cyber threats
Khandakar Md Shafin +2 more
wiley +1 more source
A hybrid demultiplexing strategy that improves performance and robustness of cell hashing. [PDF]
Li L +5 more
europepmc +1 more source
ABSTRACT Issue Addressed Health inequity for sexual minority (lesbian, gay and bisexual) people compared with heterosexual people is well documented globally. However, limited local data have been used to inform health policy and practice. This project analysed data from the New Zealand Health Survey to determine areas of inequity in health behaviours ...
Jeffery Adams +3 more
wiley +1 more source

